Ethical Hacking Training and Certification

Course description

What are the course objectives?

Craw security CEH v10 Certified Ethical Hacker training (earlier CEH v9) in Delhi provides hands-on classroom training to help you master the same techniques that hackers use to penetrate network systems and leverage them ethically to protect your own infrastructure. The extensive course focuses on 20 of the most popular security domains to provide a practical approach to essential security systems. You will learn to assess computer system security by using penetration testing techniques; scan, test and hack secure systems and applications, and gain hands-on experience with sniffing, phishing and exploitation tactics. This ethical hacking course in Delhi will prepare you for the EC-Council Certified Ethical Hacker exam 312-50.

In the latest CEH v10 EC-Council has introduced the following changes
  • CEH practical exam
  • Increased focus on Cloud attack vectors, AI and Machine Learning
  • Upgraded Vulnerability Assessment material
  • A module on the Internet of Things(IoT) Security.

 

 

Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.

White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.

Ethical Hacking  Training

  •  Hacking History- How It All Began
  •  Need For Ethical Hacking
  •  Why We Require Ethical Hackers
  • Types Of Hackers
  •  Steps In Ethical Hacking
  •   Scopes In Hacking

Windows Hacking

  •   To exploit the vulnerabilities of windows using live devices and Universal Serial Bus (USB).

Stenography

  • What is Stenography?
  • Hiding data behind Images, PDFs, Audio and Videos files

 

SQL Injection Using DVWA

  •  Introduction of SQL
  •  What are SQL INJECTION and DVWA?
  •  Checking SQL injection vulnerability (Demo)
  • Live demonstration of the attack (Demo)
  • How to protect your system from attacks

 

 

PROGRAM DETAILS:-

In or ethical hacking certification course we have 28 modules and these are listed below-

MODULE 1:- INTRODUCTION TO BASICS OF ETHICAL HACKING

MODULE 2:- FOOT-PRINTING ACTIVE(TOOL BASED PRACTICAL)

MODULE 3:- FOOT-PRINTING PASSIVE(PASSIVE APPROACH)

MODULE 4:- IN-DEPTH NETWORK SCANNING

MODULE 5:- ENUMERATION  USER IDENTIFICATION

MODULE 6:- SYSTEM HACKING PASSWORD

MODULE 7:- VIRUSES AND WORMS

MODULE 8:- TROJANS AND BACKDOOR

MODULE 9:- SNIFFERS MITM WITH WINDOW

MODULE 10:- BOT AND BOTNETS

MODULE 11:- SNIFFERS MITM WITH WINDOW

MODULE 12:- SOCIAL ENGINEERING TECHNIQUES

MODULE 13:- SOCIAL ENGINEERING TOOLKIT PRACTICAL BASED

MODULE 14:- DENIAL O SERVICES DOS DDOS ATTACKS

MODULE 15:- WEB SESSION HIJECKING

MODULE 16:- SQL INJECTION MANUAL TESTING

MODULE 17:- SQL INJECTION AUTOMATED TOOL BASED TESTING

MODULE 18:- BASICS OF WEB APP SECURITY

MODULE 19:- HACKING WEB SERVERS SERVERS ROOTING

MODULE 20:- HACKING WIRELESS NETWORK MANUAL CLI BASED

MODULE 21:- HACKING WIRELESS NETWORK : AUTOMATED TOOL BASED

MODULE 22:- EVADING IDS,FIRWALLS

MODULE 23:- HONEY POTS

MODULE 24:- BUFFER OVERFLOW

MODULE 25:- CRYPTOGRAPHY

MODULE 26:- PENETRATION TESTING : BASICS

MODULE 27:- MOBILE HACKING

MODULE 28:- CLOUD SECURITY AND MANY MORE,…….

 

With This you will have

  • weekends  and weekdays training
  • classroom and online training
  • 2 years  membership
  • 80% practical and 20% theoretical
  • 250 GB toolkit
  • video tutorials
  • audio tutorials practice labs
  • ebooks
  • extra classes/backup classes
  • certification

 

course duration:- 60 hours course

 

Recommended Courses Offered By CRAW Security